0% found this document useful (0 votes)
38 views13 pages

Level 3 Network Log

The document discusses network logging and monitoring. It describes how network devices and systems generate logs that record activity. Proper log maintenance ensures availability and integrity. Network monitoring is critical and involves monitoring devices, optimizing intervals, using protocols like SNMP, and setting thresholds. Network monitoring software automates and simplifies the monitoring process.

Uploaded by

biruk molla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views13 pages

Level 3 Network Log

The document discusses network logging and monitoring. It describes how network devices and systems generate logs that record activity. Proper log maintenance ensures availability and integrity. Network monitoring is critical and involves monitoring devices, optimizing intervals, using protocols like SNMP, and setting thresholds. Network monitoring software automates and simplifies the monitoring process.

Uploaded by

biruk molla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Network Logging

Almost all information technology systems


generate a log, which serves as a record of all the
activity that the system conducted in its
operation.
Such logs are generated by network
infrastructure devices (firewalls, switches,
domain name service devices, routers,),
computer platforms (servers, appliances, and
smart phones),
• Network logs provide organizations with
records of how systems behave and interact
with other systems. This lesson describes
network logging and a few network logging
tools that help organizations identify and
resolve potential system problems.
• In an application, a network log is typically a
file that contains a record of events that
occurred in the application. It contains the
record of user and process access calls to
objects, attempts at authentication, and other
activity.
Maintaining Logs

 Proper maintenance of network logs is imperative to


assure proper operation of the application and for
forensic investigation of suspected security issues.
 Maintenance of network logs consists primarily of
two activities
• Activity 1: Ensure the availability of the network log.
• Application developers typically limit the size of a
log event file so that it does not end up growing to a
point that its size impacts storage space availability
or some other function of the application.
• Activity 2: Ensure the integrity of the network
log.
• Log files provide crucial information about
how the application is performing, about
attempted access to resources, and other
aspects of the application's behavior.
Introduction to Network Monitoring

• Network monitoring is a critical IT process


where all networking components like routers,
switches, firewalls, servers, and VMs are
monitored for fault and performance and
evaluated continuously to maintain and
optimize their availability.
• One important aspect of network monitoring is
that it should be proactive.
Important aspects of network monitoring

 The importance of network monitoring can be


• Monitoring the essentials
• Optimizing the monitoring interval
• Selecting the right protocol
• Setting thresholds
Monitoring the essentials
• Faulty network devices impact network performance.
• This can be eliminated through early detection and
this is why continuous monitoring of network and
related devices is essential.
• In effective network monitoring, the first step is to
identify the devices and the related performance
metrics to be monitored. The second step is
determining the monitoring interval.
• Devices like desktops and printers are not critical
and do not require frequent monitoring whereas
servers, routers and switches perform business
critical task
Monitoring interval
• Monitoring interval determines the frequency at
which the network devices and its related
metrics are polled to identify the performance
and availability status.
• Setting up monitoring intervals can help to take
the load off the network monitoring system and
in turn, your resources.
Protocol and its types.

• When monitoring a network and its devices, a


common good practice is to adopt a secure and
non-bandwidth consuming network
management protocol to minimize the impact
it has on network performance.
• support SNMP(Simple Network Management
Protocol) and CLI protocols and Windows
devices support WMI protocol.
• SNMP is one of the widely accepted protocols
to manage and monitor network elements.
Benefits of the Failover system
• Instantly recognize primary server failure.
• Immediate notification via email in event of a
primary server failure.
• 100% uptime and uninterrupted network
management
• Automated, seamless switching between the
Primary server to Standby Server and vice
versa.
Network monitoring solutions.

• The process of network monitoring and


management is simplified and automated with
the help of network monitoring software and
network monitor tools.
• A network performance monitor is essential to
tackle network bottlenecks and performance
woes which might have a negative impact on
network performance.
Features of an effective network monitor software

• Visualizing your entire IT infrastructure with further


classifications based on type or logical groups.
• Automatic configuration of devices and interfaces with
predefined templates.
• Monitor and troubleshoot network, server and application
performance.
• Implement advanced network performance monitoring
techniques to quickly resolve network faults by getting to
the root of the problem.
• Get advanced reporting features with provision to
schedule and automatically
• email or publish the reports.

You might also like